Juniper is warning of unauthorized code in ScreenOS, the operating system for its NetScreen firewalls, that could allow attackers to gain administrative access and decrypt VPN connections.
"During a recent internal code review, Juniper discovered unauthorized code in ScreenOS that could allow a knowledgeable attacker to gain administrative access to NetScreen devices and to decrypt VPN connections," Bob Worrall, Juniper Networks Inc. (NYSE: JNPR)'s SVP and CIO, said on the Juniper support forums Thursday.
"At this time, we have not received any reports of these vulnerabilities being exploited; however, we strongly recommend that customers update their systems and apply the patched releases with the highest priority," Worrall said.
The vulnerability affects NetScreen devices using ScreenOS 6.2.0r15 through 6.2.0r18 and 6.3.0r12 through 6.3.0r20.
Juniper found no evidence SRX or other Junos devices were affected, Worrall said.
Juniper declined to comment on how the code got into ScreenOS.
A 2013 article in Der Spiegel said the NSA was able to break Juniper firewalls, along with "nearly all the security architecture made by the major players in the industry," including Cisco Systems Inc. (Nasdaq: CSCO), Huawei Technologies Co. Ltd. and Dell Technologies (Nasdaq: DELL)
- Polymorphic Attacks Reshape Security Landscape
- Juniper Boosts Router Automation & Performance
- Juniper Bets Big on White Box & NFV
- AT&T's Spying Activities Risk Backlash
- Verizon Responds to German Spying Concerns
- NSA Reportedly Spying on Huawei: What's Chinese for 'Ironic'?
- Huawei Names US Lead, Reminds Us It's Still Here